Taisa
We know what you're thinking: Now that the semester is over and with finals out of the way, what's a student gotta do to learn some Python during winter break around here?? Never you fear, "Beginner Python with wolfshirtz" is here!
Tag: Advanced Tooling
Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
wolfshirtz
It's not often that a tool comes along and changes things. For wolfshirtz, that tool was Ghidra, an open-source decompiler that turns assembly language into something more human-readable. And it's not often that a blog post comes along and explains Ghidra so well! Wolfshirtz walks you through how to get started with Ghidra, his tricks for getting a feel for and maximizing its features, and his cheat sheet of top hotkeys!
Reverse Engineering: Fake It Until You Make It!
Aaron James
Aaron James has a story he likes to tell people about the more intimidating challenge categories in NCL, sprinkled with tools and tips for success in Enumeration and Exploitation. Spoiler Alert: The hardest part isn't the difficulty of the challenges!
Four Ways to Analyze Logs Like a Pro!
MistressVenom
MistressVenom loves to eat logs for breakfast, lunch, and dinner, and as an awesome 2 AM snack. Let her show you how to analyze logs like a pro, using four of the tastiest methods: manually, Excel, command line, and Splunk!
Taking Password Cracking to the Next Level
Aaron James
When CrackStation, hashcat, and the infamous rockyou.txt wordlist aren't cracking those harder passwords, Aaron James shows you where he turns next in this advanced tour of password cracking tools and tricks.
NCL and WSL: Leaving the Kali VM Behind
Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!
Containerizing Your CTF Stack: Using Docker for CTFs and NCL
wolfshirtz
Containers can make setting up a tricked-out CTF work environment as easy as issuing a command or two. Not sure what containers are or how to use them? Grab a hot beverage and let wolfshirtz break it down!
Writing Elegant Regular Expressions
Paul Buonopane
What does elegant regex look like? When shouldn't you use it to parse a log? Did you know that it can crash some devices? Paul Buonopane reformats 7,326 phone numbers, then shows you how to take your regex to the next level, all before lunch!
Summer Camp 2020 – Log Analysis
Paul Buonopane
Paul Buonopane walks us through how he would solve the Summer Camp 2020 – Log Analysis challenge: Web Access Log.
Secret Information in Network Traffic Logs: NTA for NCL
Paul Buonopane
Improving your Network Traffic Analysis techniques can mean the difference between spending hours on a challenge and solving it in 5 minutes. Paul Buonopane demonstrates how to filter large packet captures in Wireshark and reassemble fragmented files from packet data.
You must be logged in to post a comment.